mirror of
https://github.com/syntrex-lab/gomcp.git
synced 2026-05-18 13:45:13 +02:00
docs: Localize Lattice specification within gomcp repo
This commit is contained in:
parent
c3ca6a322b
commit
2d653cf226
5 changed files with 1435 additions and 5 deletions
|
|
@ -90,12 +90,12 @@ GoMCP implements defense-in-depth with multiple layers:
|
|||
| **Audit** | Tampering | SHA-256 Decision Logger (immutable) |
|
||||
| **Network** | Unauthorized access | mTLS + Genome Verification |
|
||||
|
||||
All security primitives are based on the [Sentinel Lattice](https://github.com/syntrex-lab/sentinel-community/blob/main/docs/rnd/2026-02-25-sentinel-lattice-architecture.md) framework with mathematical guarantees.
|
||||
All security primitives are based on the [Sentinel Lattice](docs/lattice.md) framework with mathematical guarantees.
|
||||
|
||||
## 📚 Learn More
|
||||
|
||||
- 📚 [Full Documentation](docs/README.md)
|
||||
- 🛡️ [Sentinel Lattice Specification](https://github.com/syntrex-lab/sentinel-community/blob/main/docs/rnd/2026-02-25-sentinel-lattice-architecture.md)
|
||||
- 🛡️ [Sentinel Lattice Specification](docs/lattice.md)
|
||||
- 🔧 [MCP Tools Reference](docs/mcp-tools.md)
|
||||
- 🏢 [Enterprise Features](https://syntrex.pro)
|
||||
- 💬 [Discord Community](https://discord.gg/syntrex)
|
||||
|
|
|
|||
|
|
@ -10,4 +10,4 @@ Welcome to the GoMCP documentation. GoMCP is the open-source, mathematically pro
|
|||
|
||||
## About Sentinel Lattice
|
||||
|
||||
GoMCP uses the Sentinel Lattice framework to enforce security primitives. For in-depth theoretical understanding, see the [Sentinel Lattice Architecture Specification](https://github.com/syntrex-lab/sentinel-community/blob/main/docs/rnd/2026-02-25-sentinel-lattice-architecture.md).
|
||||
GoMCP uses the Sentinel Lattice framework to enforce security primitives. For in-depth theoretical understanding, see the [Sentinel Lattice Architecture Specification](lattice.md).
|
||||
|
|
|
|||
1430
docs/lattice.md
Normal file
1430
docs/lattice.md
Normal file
File diff suppressed because it is too large
Load diff
|
|
@ -28,4 +28,4 @@ Trust boundary crossings inherently attenuate capabilities unless explicitly aut
|
|||
|
||||
This means that even if a prompt injection tricks the LLM into initiating an exfiltration attempt, the mathematical capabilities of the data prevent the outbound network call.
|
||||
|
||||
See the full mathematical foundation in the [Sentinel Lattice Architecture Specification](https://github.com/syntrex-lab/sentinel-community/blob/main/docs/rnd/2026-02-25-sentinel-lattice-architecture.md).
|
||||
See the full mathematical foundation in the [Sentinel Lattice Architecture Specification](../lattice.md).
|
||||
|
|
|
|||
|
|
@ -12,4 +12,4 @@ Traditional security proxies rely heavily on blacklists, regex, or second-model
|
|||
|
||||
## Lattice Integration
|
||||
|
||||
DIP feeds directly into the larger [Sentinel Lattice](https://github.com/syntrex-lab/sentinel-community/blob/main/docs/rnd/2026-02-25-sentinel-lattice-architecture.md) architecture by creating early *Provenance Certificates*. This guarantees that even if a prompt "tricks" the semantic layers, the root source (the external untrusted user) is forever linked mathematically to the parsed intent.
|
||||
DIP feeds directly into the larger [Sentinel Lattice](../lattice.md) architecture by creating early *Provenance Certificates*. This guarantees that even if a prompt "tricks" the semantic layers, the root source (the external untrusted user) is forever linked mathematically to the parsed intent.
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue